TY - GEN
T1 - A novel congestion-aware interest flooding attacks detection mechanism in named data networking
AU - Benmoussa, Ahmed
AU - Tahari, Abdou el Karim
AU - Lagaa, Nasreddine
AU - Lakas, Abderrahmane
AU - Ahmad, Farhan
AU - Hussain, Rasheed
AU - Kerrache, Chaker Abdelaziz
AU - Kurugollu, Fatih
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/7
Y1 - 2019/7
N2 - Named Data Networking (NDN) is a promising candidate for future internet architecture. It is one of the implementations of the Information-Centric Networking (ICN) architectures where the focus is on the data rather than the owner of the data. While the data security is assured by definition, these networks are susceptible of various Denial of Service (DoS) attacks, mainly Interest Flooding Attacks (IFA). IFAs overwhelm an NDN router with a huge amount of interests (Data requests). Various solutions have been proposed in the literature to mitigate IFAs; however; these solutions do not make a difference between intentional and unintentional misbehavior due to the network congestion. In this paper, we propose a novel congestion-aware IFA detection and mitigation solution. We performed extensive simulations and the results clearly depict the efficiency of our proposal in detecting truly occurring IFA attacks.
AB - Named Data Networking (NDN) is a promising candidate for future internet architecture. It is one of the implementations of the Information-Centric Networking (ICN) architectures where the focus is on the data rather than the owner of the data. While the data security is assured by definition, these networks are susceptible of various Denial of Service (DoS) attacks, mainly Interest Flooding Attacks (IFA). IFAs overwhelm an NDN router with a huge amount of interests (Data requests). Various solutions have been proposed in the literature to mitigate IFAs; however; these solutions do not make a difference between intentional and unintentional misbehavior due to the network congestion. In this paper, we propose a novel congestion-aware IFA detection and mitigation solution. We performed extensive simulations and the results clearly depict the efficiency of our proposal in detecting truly occurring IFA attacks.
KW - Denial of Service
KW - Interest Flooding Attack
KW - Named Data Networking
KW - Network congestion
UR - http://www.scopus.com/inward/record.url?scp=85073167593&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85073167593&partnerID=8YFLogxK
U2 - 10.1109/ICCCN.2019.8847146
DO - 10.1109/ICCCN.2019.8847146
M3 - Conference contribution
AN - SCOPUS:85073167593
T3 - Proceedings - International Conference on Computer Communications and Networks, ICCCN
BT - ICCCN 2019 - 28th International Conference on Computer Communications and Networks
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 28th International Conference on Computer Communications and Networks, ICCCN 2019
Y2 - 29 July 2019 through 1 August 2019
ER -